ACI worldwide scamscope projects APP scam losses in India to reach INR49,626 million by 2028, ET CISO Authorized push payment (APP) scam losses in India reached INR 37,309 million in 2023 and are projected to grow at a 6% compound annual growth rate (CAGR) to reach INR 49,626 million by 2028, according to the latest Scamscope report from ACI Worldwide ...
Read More »Blog
Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online
Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online https://firewall.firm.in/wp-content/uploads/2024/12/serves-hacking.png Dec 12, 2024Ravie LakshmananVulnerability / Cloud Security Cybersecurity researchers are warning that thousands of servers hosting the Prometheus monitoring and alerting toolkit are at risk of information leakage and exposure to denial-of-service (DoS) as well as remote code execution (RCE) attacks. “Prometheus servers or exporters, often lacking proper ...
Read More »Combating cyber fraud threats for success of the India digital growth story – ET CISO
Combating cyber fraud threats for success of the India digital growth story – ET CISO https://etimg.etb2bimg.com/thumb/msid-116240221,imgsize-194996,width-1200,height=765,overlay-etciso/ciso-strategies/combating-cyber-fraud-threats-for-success-of-the-india-digital-growth-story.jpg From 10-minute deliveries to real-time digital payments via UPI and cash transfers through AEPS, technology has paved the way for financial inclusion and long-term growth. In the insurance sector, technology has simplified access to and understanding of insurance products, enabling customers to secure policies ...
Read More »The keys to defeating modern cyber threats, ET CISO
The keys to defeating modern cyber threats, ET CISO In today’s threat landscape, speed and visibility are critical for organisations to counter increasingly sophisticated adversaries. Modern attacks now span endpoints, identities, and cloud environments, requiring a unified approach to safeguard digital ecosystems. Organisations that cannot adapt to this complexity risk falling behind attackers who operate with speed, precision, and stealth. ...
Read More »Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service
Secret Blizzard Deploys Kazuar Backdoor in Ukraine Using Amadey Malware-as-a-Service https://firewall.firm.in/wp-content/uploads/2024/12/hacking.png Dec 11, 2024Ravie LakshmananMalware / Cyber Espionage The Russian nation-state actor tracked as Secret Blizzard has been observed leveraging malware associated with other threat actors to deploy a known backdoor called Kazuar on target devices located in Ukraine. The new findings come from the Microsoft threat intelligence team, which ...
Read More »AI can be misused, climate change a new threat to rights: President Murmu – ET CISO
AI can be misused, climate change a new threat to rights: President Murmu – ET CISO https://etimg.etb2bimg.com/thumb/msid-116188866,imgsize-974938,width-1200,height=765,overlay-etciso/corporate/ai-can-be-misused-climate-change-a-new-threat-to-rights-president-murmu.jpg President Droupadi Murmu on Tuesday said artificial intelligence has entered people’s day-to-day life, solving many problems as well as creating new ones. Cautioning against misuse of AI, she said, “The human rights discourse so far has been centred on the human agency, that ...
Read More »mastering strategies to tackle fourth-party cyber risks, ET CISO
mastering strategies to tackle fourth-party cyber risks, ET CISO Cyber risks or the potential for an organization to experience loss or damage due to cyber attacks, data breaches, or other cyber-related incidents, have increasingly captured the attention of business leaders, as they represent significant operational challenges with the potential to cause severe financial losses and irreparable harm to an organization’s ...
Read More »Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam
Fake Recruiters Distribute Banking Trojan via Malicious Apps in Phishing Scam https://firewall.firm.in/wp-content/uploads/2024/12/phishing.png Dec 10, 2024Ravie LakshmananMobile Security / Cryptocurrency Cybersecurity researchers have shed light on a sophisticated mobile phishing (aka mishing) campaign that’s designed to distribute an updated version of the Antidot banking trojan. “The attackers presented themselves as recruiters, luring unsuspecting victims with job offers,” Zimperium zLabs Vishnu Pratapagiri ...
Read More »TCS launches 2025 cybersecurity outlook: names these 7 key tech priorities for enterprises – ET CISO
TCS launches 2025 cybersecurity outlook: names these 7 key tech priorities for enterprises – ET CISO https://etimg.etb2bimg.com/thumb/msid-116188954,imgsize-23088,width-1200,height=765,overlay-etciso/cybercrime-fraud/tcs-launches-2025-cybersecurity-outlook-names-these-7-key-tech-priorities-for-enterprises.jpg Businesses need to prepare for evolving cyber threats by embracing new technologies like artificial intelligence (AI) for defense and prioritizing cloud security, according to a new report by Tata Consultancy Services (TCS). The report, titled “TCS 2025 Cybersecurity Outlook,” identifies key trends that ...
Read More »Cyberattacks to spike in 2025; healthcare and finance sectors at risk: Report, ET CISO
Cyberattacks to spike in 2025; healthcare and finance sectors at risk: Report, ET CISO NEW DELHI: A recent report by the Data Security Council of India and Seqerite raised serious concerns about the increasing vulnerability of the finance and healthcare sectors to cyberattacks. The India Cyber Threat Report 2025 revealed that these industries would be at an alarming risk because ...
Read More »